Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Homeland security techniques and technologies (Networking Series)
Mena J., Charles River Media, Inc., Rockland, MA, 2004. Type: Book (9781584503286)
Date Reviewed: Mar 17 2005

The security functions of government services, in the US and many other countries, have undergone many changes, particularly following the September 11, 2001 terrorist attacks. One of the key changes has been the collection, analysis, and dissemination of information. In this book, Mena examines many of these challenges. The book is targeted toward government agencies with homeland security functions.

Following an overview of the objectives, processes, and mission of homeland security, Mena details six tasks to address these, and the techniques and technologies required to undertake them. A CD-ROM containing trial versions of some of the products discussed is also provided. A reasonably detailed index and table of contents allow for easy navigation of the book.

The six tasks Mena identifies are aggregation, integration, collaboration, categorization, intelligence, and mining, with each discussed in detail as a chapter in the book. Each chapter contains descriptions of various tools or techniques that address the task, such as Oracle and Teradata for data mining, and there are some case studies included that detail the application of particular tools and techniques in real-life situations. Some interesting facts can also be gleaned throughout the book, such as the method used for computer name search systems, developed in the early 1900s, that still exists today.

Overall, the book provides an interesting look at the challenges faced in information management for agencies involved in combating terrorism. One downfall of the book is that some sections read more like product reviews, and may leave the reader wanting more detail about the techniques rather than the products. While the book does not delve into low-level technical details, potential readers should have a basic understanding of data mining techniques and information management.

Reviewer:  V. Stagg Review #: CR130998
Bookmark and Share
  Reviewer Selected
 
 
Unauthorized Access (K.6.5 ... )
 
 
Data Mining (H.2.8 ... )
 
 
Knowledge Acquisition (I.2.6 ... )
 
 
Database Applications (H.2.8 )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy